1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
9

An I/O-bound program is one that, if run alone, would spend more time waiting for I/O than using the processor. A processor-boun

d program is the opposite. Suppose a short-term scheduling algorithm favors those programs that have used little processor time in the recent past. Explain why this algorithm favors I/O-bound programs and yet does not permanently deny processor time to processor-bound programs.
Computers and Technology
1 answer:
Lelechka [254]3 years ago
3 0

Answer with Explanation:

An I/O-bound the programs that are used relatively a little processor times and are favored by an algorithm. However, if the processor bound process is denied the processor time for the sufficiently long periods of times, the same algorithms will be granted a processor to the process and it has not use the processors at all in recent pasts. Therefore, the processor bound process will not be the permanently denied to access.

You might be interested in
Five advantages of Internet​
Debora [2.8K]

Answer:

1. Accessible to find information

2. Computer can store information you need

3. Communication world wide to connect with others

4. High tech learning

5. Many entertaining platforms and games  

Explanation:

Hope that helps

3 0
3 years ago
A(n) _____ measures the ability to juggle a variety of demands, as in a manager's job where the candidate is presented with simu
Tju [1.3M]

Answer: in-basket test

Explanation:

An in-basket test or an in-basket exercise is a test used by firms or governments in recruiting and promoting employees. During the test, job applicants receive some mails, telephone calls, documents and memos.

3 0
4 years ago
true or false if you type too much text on a powerpoint slide, the additional text is added to a second slide
Nady [450]
True I've had it happen alot
3 0
3 years ago
Read 2 more answers
How to Pass VMware VCA6-DCV 1V0-621 Exam in First Attempt ?
erastova [34]
Get 100% success guarantee with updated Vmware VCA6-DCV 1V0-621 Certification exam in first attempt by certsbay.com  https://www.certsbay.com/Vmware/1V0-621-exam-questions
7 0
4 years ago
When Hallmark designs its website so that a teenage girl can send a theme card to her boyfriend's cell phone, what is the primar
padilas [110]

Answer:

Hallmark is using the Age segmenting dimension.

Explanation:

Most businesses and organizations tend to understand their customers, that is, their behaviors on purchases.

There are 7 important ways businesses segment their customers. They are:

  1. Income
  2. Age
  3. Gender
  4. Acquisition Path
  5. First purchase
  6. Geography
  7. Device type

In our scenario, Hallmark is using the Age segmenting dimension because they can identify that its a teenage girl that is sending theme card to her boyfriend's cell phone.

7 0
3 years ago
Other questions:
  • Hailey is preparing a questionnaire on the different number systems. He asks the students to write down the correct decimal and
    10·2 answers
  • Write a function that iteratively appends random 1's and 0's to an array to form a binary number. The function returns the binar
    13·1 answer
  • Different project management steps are initiating, planning, executing, monitoring and controlling, and closing a project. Which
    9·1 answer
  • Discuss how advertising on the Web affects search results and the ethical dilemmas associated with it.
    5·1 answer
  • May someone help please. :(
    9·1 answer
  • Ifdjgidfpojcjdizchnllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllsssssssssssssssssssssssssss
    13·2 answers
  • How do I fix this? It stopped adding up my points when i did one of the challenges.
    11·2 answers
  • Which of the columns (A) to (I) in the truth table below is correct for the expression
    13·2 answers
  • susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct state
    13·1 answer
  • Select the correct text in the passage.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!